WO2014207919A1 - Electronic device - Google Patents
Electronic device Download PDFInfo
- Publication number
- WO2014207919A1 WO2014207919A1 PCT/JP2013/067880 JP2013067880W WO2014207919A1 WO 2014207919 A1 WO2014207919 A1 WO 2014207919A1 JP 2013067880 W JP2013067880 W JP 2013067880W WO 2014207919 A1 WO2014207919 A1 WO 2014207919A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- log
- transmission
- storage unit
- time
- unit
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Definitions
- Embodiments described herein relate generally to an electronic device that transmits a communication log.
- a typical log is a communication log.
- a large number of communication logs are sent when a large number of communication packets are generated in a short period of time called multiple state change that occurs in the case of a failure in the control system. For this reason, when a large number of communication logs are generated in a short time, there are cases where the transmission delay of communication packets, regular packets, and communication logs are lost due to an increase in network bandwidth and server load.
- An object of the present invention is to provide an electronic device capable of preventing transmission delay of communication packets and loss of regular packets and communication logs when a large number of communication logs are generated in a short time. is there.
- the electronic device includes a generation unit, a first storage unit, a setting unit, and a transmission processing unit.
- the generation unit generates a log of packets transmitted to the first communication device and packets transmitted from the first communication device.
- the first storage unit stores the log generated by the generating unit.
- the setting means sets a transmission waiting time for the logs stored in the storage unit according to the number of logs stored in the storage unit.
- the transmission processing means performs processing for transmitting each log to the analysis device according to the transmission standby time of each log.
- FIG. 1 is a block diagram illustrating an example of a system configuration.
- FIG. 2 is a block diagram illustrating an example of a configuration of a control system including the communication log generation device according to the embodiment.
- FIG. 3 is a block diagram illustrating an example of a configuration of the communication log generation device according to the embodiment.
- FIG. 4 is a flowchart showing a procedure for setting a standby time in the communication log after the communication log is generated.
- FIG. 5 is a flowchart showing a procedure for transmitting a communication log.
- FIG. 6 is a block diagram illustrating an example of the configuration of the security monitoring center.
- FIG. 7 is a block diagram illustrating an example of the configuration of the communication log generation device according to the embodiment.
- FIG. 1 is a diagram illustrating an example of the configuration of a system including a communication log generation device according to the present embodiment.
- a remote monitoring system 20 and a security monitoring center 30 are connected to a control system 10 to be monitored for security via a network A such as the Internet.
- the security monitoring center 30 detects and reports an attack on the control system by analyzing and monitoring the communication log transmitted from the control system 10.
- the remote monitoring system 20 may not be provided.
- the network connecting the control system 10 and the remote monitoring system 20 and the network connecting the control system 10 and the security monitoring center 30 may be the same network or different networks.
- the control system 10 monitors plants, buildings, and the like.
- the control system 10 notifies the remote monitoring system 20 of the monitoring result.
- the remote monitoring system 20 controls the control system 10 based on the monitoring result.
- the control system 10 transmits a communication log described later to the security monitoring center 30.
- the security monitoring center 30 analyzes the communication log.
- the log analysis unit 204 detects a security attack or an intrusion that is a sign of the security attack by analysis.
- FIG. 2 is a block diagram showing an example of the configuration of the control system 10 including the communication log generation device of the present embodiment that transmits a communication log.
- the control system 10 includes communication log generation devices 100A and 100B, controllers 110A and 110B, sensors 111A and 111B, actuators (ACT) 112A and 112B, a control server 120, a router 130, and the like.
- Controllers 110A and 110B are connected to a network B such as a LAN (local area network) via communication log generation apparatuses 100A and 100B.
- Sensors 111A and 111B and actuators 112A and 112B are connected to the controllers 110A and 110B.
- a control server 120 and a router 130 are connected to the network B.
- FIG. 3 is a block diagram illustrating an example of the configuration of the communication log generation device.
- the communication log generation device 100 includes a first transmission / reception unit 101, a relay unit 102, a second transmission / reception unit 103, a communication log generation unit 104, a temporary storage unit 105, a transmission delay time setting unit 106, a random number generation unit 107, a communication log A transmission processing unit 108 and a communication log transmission time storage unit 109 are provided.
- the first transmission / reception unit 101 receives the packet data transmitted from the controller 110.
- the first transmission / reception unit 101 transmits the packet data transmitted from the controller 110 to the second transmission / reception unit 103 via the relay unit 102.
- the second transmission / reception unit 103 transmits the packet data received via the relay unit 102.
- the second transmission / reception unit 103 receives packet data addressed to the controller 110.
- the second transmission / reception unit 103 transmits packet data addressed to the controller 110 to the first transmission / reception unit 101 via the relay unit 102.
- the first transmission / reception unit 101 transmits packet data received via the relay unit 102 to the controller 110.
- the relay unit 102 transmits the received packet data to the communication log generation unit 104.
- the communication log generation unit 104 Each time the communication log generation unit 104 receives packet data, the communication log generation unit 104 generates a communication log based on the received packet data.
- the communication log includes, for example, a destination of a packet transmission source, a destination of a transmission destination, all data of packet data, or data of a predetermined number of bytes.
- the communication log further includes a time stamp.
- the communication log generation unit 104 stores the generated communication log in the temporary storage unit 105.
- the transmission delay time setting unit 106 sets the transmission standby time of each communication log stored in the temporary storage unit 105 according to the number of communication logs stored in the temporary storage unit 105. When the number of communication logs stored in temporary storage unit 105 is not greater than the set value, transmission delay time setting unit 106 sets the transmission standby time of each communication log stored in temporary storage unit 105 to 0. To do. When the number of communication logs stored in the temporary storage unit 105 is larger than the set value, the transmission delay time setting unit 106 sets the transmission standby time of each communication log stored in the temporary storage unit 105 to a value greater than zero. Set to.
- the transmission delay time setting unit 106 When a communication log is newly stored in the temporary storage unit 105, the transmission delay time setting unit 106 counts the number of communication logs stored in the temporary storage unit 105. When the number of communication logs is not larger than the set number, the transmission delay time setting unit 106 sets the transmission waiting time of the communication log stored in the temporary storage unit 105 to zero. When the number of communication logs is larger than the set number, the transmission delay time setting unit 106 sets the transmission delay time for all communication logs stored in the temporary storage unit 105. The transmission delay time setting unit 106 converts the random number generated by the random number generation unit 107 into a transmission standby time using a predetermined function. For example, a linear function is used as the predetermined function. The transmission delay time setting unit 106 sets the transmission standby time converted into the communication log. Nao, the transmission delay time setting unit 106 may set a predetermined time as the transmission standby time.
- the communication log transmission processing unit 108 performs processing for transmitting the communication log to the security monitoring center 30 serving as an analysis device based on the transmission standby time set in each communication log in the temporary storage unit 105.
- the communication log transmission processing unit 108 records transmission time information indicating the transmission time in the communication log transmission time storage unit 109.
- FIG. 4 is a flowchart showing a procedure for setting a waiting time in the communication log after the communication log is generated. With reference to the flowchart of FIG. 4, a procedure for setting a waiting time in the communication log after the communication log is generated will be described.
- the communication log generation unit 104 When the packet data addressed to the controller 110 or the packet data transmitted from the controller 110 is received, the communication log generation unit 104 generates a communication log based on the received packet data (step B11). The communication log generation unit 104 stores the generated packet data in the temporary storage unit 105 (step B12).
- the transmission delay time setting unit 106 When a communication log is newly stored in the temporary storage unit 105, the transmission delay time setting unit 106 counts the number of communication logs stored in the temporary storage unit 105 (step B13). The transmission delay time setting unit 106 determines whether the counted number of communication logs is larger than the number of communication logs (step B14). When the number of communication logs stored in the temporary storage unit 105 is larger than the set number (Yes in step B14), the transmission delay time setting unit 106 temporarily stores the communication logs stored in the temporary storage unit 105. It is determined whether a transmission delay time is set in the oldest communication log in the storage unit 105 (step B15).
- the transmission delay time setting unit 106 sets the transmission delay time for the communication log stored last in the temporary storage unit 105 (Step B16).
- the transmission delay time setting unit 106 sets the transmission delay time for all communication logs in the temporary storage unit 105 (Step B17). .
- the transmission delay time setting unit 106 stores all of the communication logs stored in the temporary storage unit 105. Is set to 0 (step B18).
- FIG. 5 is a flowchart showing a procedure for transmitting a communication log.
- a procedure for transmitting a communication log will be described with reference to the flowchart of FIG.
- the communication log transmission processing unit 108 acquires the transmission delay time set in the oldest communication log in the temporary storage unit 105 (step B21).
- the communication log transmission processing unit 108 acquires transmission time information indicating the transmission time of the communication log last transmitted from the communication log transmission time storage unit 109 (step B22).
- the communication log transmission processing unit 108 determines whether the scheduled transmission time, which is the time obtained by adding the transmission standby time to the transmission time of the communication log transmitted last, is over (step B23).
- the transmission delay time setting unit 106 executes Step B23 again after a predetermined time.
- the predetermined time is, for example, a time obtained by subtracting the current time from the scheduled transmission time.
- the communication log transmission processing unit 108 uses the second transmission / reception unit 103 to store the oldest communication log in the temporary storage unit 105. Is transmitted to the security monitoring center 30 (step B24). The communication log transmission processing unit 108 records the transmission time in the communication log transmission time storage unit 109 (step B25). The communication log transmission processing unit 108 deletes the oldest communication log in the temporary storage unit 105 (step B26).
- the communication log When the number of communication logs stored in the temporary storage unit 105 is larger than the set number, the communication log is not transmitted immediately, but is transmitted by delaying the communication log. Even when such a large number of status change events are generated, the communication log can be communicated without the communication line becoming tight with the communication log.
- Time correction Delaying the transmission of the communication log causes a difference between the reception time at the security monitoring center 30 and the event occurrence time. Although this problem can be avoided by putting a time stamp in the communication log, the time synchronization of each device needs to be accurate. Therefore, when a delay is added, it is possible to add a delay time information based on the delay time to the communication log so that the security monitoring center can correct the time.
- the delay time information is a time indicating a difference between the scheduled transmission time and the communication log generation time.
- FIG. 6 is a block diagram illustrating an example of the configuration of the security monitoring center 30.
- the security monitoring center 30 includes a log receiving unit 201, a log recording unit 202, a time correction unit 203, a log analysis unit 204, a result presentation unit 205, and the like.
- the log receiving unit 201 receives a communication log via the network A.
- the received communication log is stored in the log recording unit 202.
- the received communication log is notified to the time correction unit 203.
- the time correction unit 203 corrects the transmission time (or reception time) of the communication log based on the delay time information in the communication log.
- the log analysis unit 204 analyzes the communication log using the corrected time.
- the log analysis unit 204 detects a security attack or an intrusion that is a sign of the security attack by analysis. Specifically, there is an analysis called anomaly analysis. For example, there is a method of determining an attack by finding a communication pattern different from a normal communication pattern by correlation analysis or the like.
- the result presentation unit 205 performs a process of presenting the fact.
- a log transmission unit 301 for transmitting a communication log is provided, and the communication log transmission processing unit 108 performs processing for transmitting a communication log to the security monitoring center 30 using the log transmission unit 301. You can go.
- the scheduled transmission time which is the time when the transmission waiting time is added to the transmission time of the communication log transmitted last, is the time when the transmission waiting time is added to the time when the communication log is generated. May be the scheduled transmission time.
- the delay time information is a time indicating a difference between the scheduled transmission time and the communication log generation time.
- the communication log when the number of communication logs stored in the temporary storage unit 105 is larger than the set number, the communication log is not transmitted immediately, but is transmitted with a delay, Even when a large number of status change events such as multiple status changes in the control system are generated, the communication line is not constrained by the communication log, preventing transmission packet transmission delays and loss of regular packets and communication logs. It becomes possible.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Debugging And Monitoring (AREA)
Abstract
According to an embodiment, an electronic device is equipped with a generation means, a first storage unit, a setting means, and a transmission processing unit. The generation means generates logs of packets transmitted to a fist communication device and packets transmitted from the fist communication device. The first storage unit stores the logs generated by the generation means. The setting means sets transmission standby times with respect to the logs stored in the storage unit in accordance with the number of the logs stored in the storage unit. The transmission processing unit performs processing for transmitting the respective logs to an analysis device in accordance with the transmission standby times of the respective logs.
Description
本発明の実施形態は、通信ログを送信する電子機器に関する。
Embodiments described herein relate generally to an electronic device that transmits a communication log.
制御システムにセキュリティ攻撃の脅威が高まっているが、一方でITシステムと異なり設備更新期間が長い、アップデートによるシステム停止のリスクが高いことから、ログによる監視で攻撃を検知する手法が着目されてきた。ログの代表的なものには通信ログがある。
The threat of security attacks on control systems is increasing. On the other hand, unlike IT systems, the equipment update period is long, and the risk of system outages due to updates is high. Therefore, techniques for detecting attacks through log monitoring have attracted attention. . A typical log is a communication log.
制御システムで障害時に起こる多重状変と呼ぶ短時間に多数の通信パケットが発生する状態になった際に、多数の通信ログが送信される。このため、短時間に多数の通信ログが生成された場合に、ネットワーク帯域やサーバ負荷が増大することにより、通信パケットの伝送遅延や正規のパケットや通信ログが失われる場合があった。
A large number of communication logs are sent when a large number of communication packets are generated in a short period of time called multiple state change that occurs in the case of a failure in the control system. For this reason, when a large number of communication logs are generated in a short time, there are cases where the transmission delay of communication packets, regular packets, and communication logs are lost due to an increase in network bandwidth and server load.
本発明の目的は、短時間に多数の通信ログが生成された場合に、通信パケットの伝送遅延や正規のパケットや通信ログが失われることを防止することが可能な電子機器を提供することにある。
An object of the present invention is to provide an electronic device capable of preventing transmission delay of communication packets and loss of regular packets and communication logs when a large number of communication logs are generated in a short time. is there.
実施形態によれば、電子機器は、生成手段と、第1の記憶部と、設定手段と、送信処理手段とを具備する。生成手段は、第1の通信装置宛てに送信されたパケットおよび前記第1の通信装置から送信されたパケットのログを生成する。第1の記憶部は、前記生成手段によって生成されたログを格納する。設定手段は、前記記憶部に格納されているログの数に応じて、前記記憶部に格納されているログに対して送信待機時間を設定する。送信処理手段は、各ログの送信待機時間に応じて、各ログを解析装置に送信するための処理を行う。
According to the embodiment, the electronic device includes a generation unit, a first storage unit, a setting unit, and a transmission processing unit. The generation unit generates a log of packets transmitted to the first communication device and packets transmitted from the first communication device. The first storage unit stores the log generated by the generating unit. The setting means sets a transmission waiting time for the logs stored in the storage unit according to the number of logs stored in the storage unit. The transmission processing means performs processing for transmitting each log to the analysis device according to the transmission standby time of each log.
以下、実施の形態について図面を参照して説明する。
Hereinafter, embodiments will be described with reference to the drawings.
図1は、本実施形態の通信ログ生成装置を含むシステムの構成の一例を示す図である。
FIG. 1 is a diagram illustrating an example of the configuration of a system including a communication log generation device according to the present embodiment.
図1に示すように、セキュリティを監視する対象の制御システム10がインターネット等のネットワークAを介して、遠隔監視システム20と、セキュリティ監視センタ30とが接続されている。セキュリティ監視センタ30は、制御システム10から送信される通信ログを分析・監視することで、制御システムへの攻撃を検知・通報する。
As shown in FIG. 1, a remote monitoring system 20 and a security monitoring center 30 are connected to a control system 10 to be monitored for security via a network A such as the Internet. The security monitoring center 30 detects and reports an attack on the control system by analyzing and monitoring the communication log transmitted from the control system 10.
なお、遠隔監視システム20はなくても良い。また、制御システム10と遠隔監視システム20とを接続するネットワークと、制御システム10とセキュリティ監視センタ30とを接続するネットワークとは、ネットワークは同一であっても、別ネットワークであっても良い。
The remote monitoring system 20 may not be provided. The network connecting the control system 10 and the remote monitoring system 20 and the network connecting the control system 10 and the security monitoring center 30 may be the same network or different networks.
制御システム10は、プラントやビル等を監視する。制御システム10は、監視結果を遠隔監視システム20に通知する。遠隔監視システム20は、監視結果に基づいて制御システム10を制御する。
The control system 10 monitors plants, buildings, and the like. The control system 10 notifies the remote monitoring system 20 of the monitoring result. The remote monitoring system 20 controls the control system 10 based on the monitoring result.
制御システム10は、後述する通信ログをセキュリティ監視センタ30に送信する。セキュリティ監視センタ30は、通信ログを分析する。ログ分析部204は、分析により、セキュリティ攻撃やその予兆となる侵入を検知する。
The control system 10 transmits a communication log described later to the security monitoring center 30. The security monitoring center 30 analyzes the communication log. The log analysis unit 204 detects a security attack or an intrusion that is a sign of the security attack by analysis.
図2は、通信ログを送信する本実施形態の通信ログ生成装置を含む制御システム10の構成の一例を示すブロック図。制御システム10は、通信ログ生成装置100A,100B、コントローラ110A,110B、センサ111A,111B、アクチュエータ(ACT)112A,112B、制御サーバ120、ルータ130等を備えている。
FIG. 2 is a block diagram showing an example of the configuration of the control system 10 including the communication log generation device of the present embodiment that transmits a communication log. The control system 10 includes communication log generation devices 100A and 100B, controllers 110A and 110B, sensors 111A and 111B, actuators (ACT) 112A and 112B, a control server 120, a router 130, and the like.
コントローラ110A,110Bが通信ログ生成装置100A,100Bを介してLAN(local area network)などのネットワークBに接続されている。コントローラ110A,110Bにセンサ111A,111Bおよびアクチュエータ112A,112Bが接続されている。制御サーバ120およびルータ130がネットワークBに接続されている。なお、センサ111A,111Bは、複数あっても良い。アクチュエータ112A,112Bは、複数あっても良い。
Controllers 110A and 110B are connected to a network B such as a LAN (local area network) via communication log generation apparatuses 100A and 100B. Sensors 111A and 111B and actuators 112A and 112B are connected to the controllers 110A and 110B. A control server 120 and a router 130 are connected to the network B. There may be a plurality of sensors 111A and 111B. There may be a plurality of actuators 112A and 112B.
図3は、通信ログ生成装置の構成の一例を示すブロック図である。
通信ログ生成装置100は、第1の送受信部101、中継部102、第2の送受信部103、通信ログ生成部104、一時記憶部105、送信遅延時間設定部106、乱数生成部107、通信ログ送信処理部108、および通信ログ送信時間記憶部109等を備えている。 FIG. 3 is a block diagram illustrating an example of the configuration of the communication log generation device.
The communication log generation device 100 includes a first transmission /reception unit 101, a relay unit 102, a second transmission / reception unit 103, a communication log generation unit 104, a temporary storage unit 105, a transmission delay time setting unit 106, a random number generation unit 107, a communication log A transmission processing unit 108 and a communication log transmission time storage unit 109 are provided.
通信ログ生成装置100は、第1の送受信部101、中継部102、第2の送受信部103、通信ログ生成部104、一時記憶部105、送信遅延時間設定部106、乱数生成部107、通信ログ送信処理部108、および通信ログ送信時間記憶部109等を備えている。 FIG. 3 is a block diagram illustrating an example of the configuration of the communication log generation device.
The communication log generation device 100 includes a first transmission /
第1の送受信部101は、コントローラ110から送信されたパケットデータを受信する。第1の送受信部101は、コントローラ110から送信されたパケットデータを中継部102を介して第2の送受信部103に送信する。第2の送受信部103は、中継部102を介して受信したパケットデータを送信する。
The first transmission / reception unit 101 receives the packet data transmitted from the controller 110. The first transmission / reception unit 101 transmits the packet data transmitted from the controller 110 to the second transmission / reception unit 103 via the relay unit 102. The second transmission / reception unit 103 transmits the packet data received via the relay unit 102.
第2の送受信部103は、コントローラ110宛てのパケットデータを受信する。第2の送受信部103は、中継部102を介して、コントローラ110宛てのパケットデータを第1の送受信部101に送信する。第1の送受信部101は、中継部102を介して受信したパケットデータをコントローラ110に送信する。
The second transmission / reception unit 103 receives packet data addressed to the controller 110. The second transmission / reception unit 103 transmits packet data addressed to the controller 110 to the first transmission / reception unit 101 via the relay unit 102. The first transmission / reception unit 101 transmits packet data received via the relay unit 102 to the controller 110.
中継部102は、受信したパケットデータを通信ログ生成部104に送信する。通信ログ生成部104は、パケットデータを受信する度に、受信したパケットデータに基づいて、通信ログを生成する。通信ログは、たとえば、パケットの送信元の宛先、または、送信先の宛先、パケットデータの全部のデータ、または、既定のバイト数のデータを含む。通信ログは、タイムスタンプを更に含む。通信ログ生成部104は、生成された通信ログを一時記憶部105に格納する。
The relay unit 102 transmits the received packet data to the communication log generation unit 104. Each time the communication log generation unit 104 receives packet data, the communication log generation unit 104 generates a communication log based on the received packet data. The communication log includes, for example, a destination of a packet transmission source, a destination of a transmission destination, all data of packet data, or data of a predetermined number of bytes. The communication log further includes a time stamp. The communication log generation unit 104 stores the generated communication log in the temporary storage unit 105.
送信遅延時間設定部106は、一時記憶部105に格納されている通信ログの数に応じて、一時記憶部105に格納されている各通信ログの送信待機時間を設定する。一時記憶部105に格納されている通信ログの数が設定値より多くない場合に、送信遅延時間設定部106は、一時記憶部105に格納されている各通信ログの送信待機時間を0に設定する。一時記憶部105に格納されている通信ログの数が設定値より多い場合に、送信遅延時間設定部106は、一時記憶部105に格納されている各通信ログの送信待機時間を0より大きい値に設定する。
The transmission delay time setting unit 106 sets the transmission standby time of each communication log stored in the temporary storage unit 105 according to the number of communication logs stored in the temporary storage unit 105. When the number of communication logs stored in temporary storage unit 105 is not greater than the set value, transmission delay time setting unit 106 sets the transmission standby time of each communication log stored in temporary storage unit 105 to 0. To do. When the number of communication logs stored in the temporary storage unit 105 is larger than the set value, the transmission delay time setting unit 106 sets the transmission standby time of each communication log stored in the temporary storage unit 105 to a value greater than zero. Set to.
一時記憶部105に通信ログが新たに格納されると、送信遅延時間設定部106は、一時記憶部105に格納されている通信ログの数をカウントする。通信ログの数が設定数より大きくない場合、送信遅延時間設定部106は、一時記憶部105に格納されている通信ログの送信待機時間を0に設定する。通信ログの数が設定数より大い場合、送信遅延時間設定部106は、一時記憶部105に格納されている全ての通信ログに対して送信遅延時間を設定する。送信遅延時間設定部106は、乱数生成部107によって生成された乱数を所定の関数を用いて送信待機時間に変換する。所定の関数は、例えば一次関数を用いる。送信遅延時間設定部106は、通信ログに変換された送信待機時間を設定する。奈緒、送信遅延時間設定部106は、送信待機時間として、予め定義された一定の時間を設定しても良い。
When a communication log is newly stored in the temporary storage unit 105, the transmission delay time setting unit 106 counts the number of communication logs stored in the temporary storage unit 105. When the number of communication logs is not larger than the set number, the transmission delay time setting unit 106 sets the transmission waiting time of the communication log stored in the temporary storage unit 105 to zero. When the number of communication logs is larger than the set number, the transmission delay time setting unit 106 sets the transmission delay time for all communication logs stored in the temporary storage unit 105. The transmission delay time setting unit 106 converts the random number generated by the random number generation unit 107 into a transmission standby time using a predetermined function. For example, a linear function is used as the predetermined function. The transmission delay time setting unit 106 sets the transmission standby time converted into the communication log. Nao, the transmission delay time setting unit 106 may set a predetermined time as the transmission standby time.
通信ログ送信処理部108は、一時記憶部105内のそれぞれ通信ログに設定された送信待機時間に基づいて、通信ログを解析装置としてのセキュリティ監視センタ30に送信する処理を行う。通信ログを送信した場合、通信ログ送信処理部108は、通信ログ送信時間記憶部109に送信時間を示す送信時間情報を記録する。
The communication log transmission processing unit 108 performs processing for transmitting the communication log to the security monitoring center 30 serving as an analysis device based on the transmission standby time set in each communication log in the temporary storage unit 105. When the communication log is transmitted, the communication log transmission processing unit 108 records transmission time information indicating the transmission time in the communication log transmission time storage unit 109.
図4は、通信ログが生成されてから通信ログに待機時間を設定する手順を示すフローチャートである。図4のフローチャートを参照して、通信ログが生成されてから通信ログに待機時間を設定する手順を説明する。
FIG. 4 is a flowchart showing a procedure for setting a waiting time in the communication log after the communication log is generated. With reference to the flowchart of FIG. 4, a procedure for setting a waiting time in the communication log after the communication log is generated will be described.
コントローラ110宛てのパケットデータ、またはコントローラ110から送信されたパケットデータを受信した場合、通信ログ生成部104は、受信したパケットデータに基づいて通信ログを生成する(ステップB11)。通信ログ生成部104は、生成されたパケットデータを一時記憶部105に格納する(ステップB12)。
When the packet data addressed to the controller 110 or the packet data transmitted from the controller 110 is received, the communication log generation unit 104 generates a communication log based on the received packet data (step B11). The communication log generation unit 104 stores the generated packet data in the temporary storage unit 105 (step B12).
一時記憶部105に通信ログが新たに格納された場合、送信遅延時間設定部106は、一時記憶部105内に格納されている通信ログの数をカウントする(ステップB13)。送信遅延時間設定部106は、カウントされた通信ログ数が通信ログの数より多いかを判定する(ステップB14)。一時記憶部105内に格納されている通信ログの数が設定数より多い場合(ステップB14のYes)、送信遅延時間設定部106は、一時記憶部105内に格納されている通信ログについて、一時記憶部105内の一番古い通信ログに送信遅延時間が設定されているかを判定する(ステップB15)。送信遅延時間が設定されていると判定した場合(ステップB15のYes)、送信遅延時間設定部106は、一時記憶部105内に最後に格納された通信ログに対して送信遅延時間を設定する(ステップB16)。送信遅延時間が設定されていないと判定した場合(ステップB15のNo)、送信遅延時間設定部106は、一時記憶部105内に全ての通信ログに対して送信遅延時間を設定する(ステップB17)。
When a communication log is newly stored in the temporary storage unit 105, the transmission delay time setting unit 106 counts the number of communication logs stored in the temporary storage unit 105 (step B13). The transmission delay time setting unit 106 determines whether the counted number of communication logs is larger than the number of communication logs (step B14). When the number of communication logs stored in the temporary storage unit 105 is larger than the set number (Yes in step B14), the transmission delay time setting unit 106 temporarily stores the communication logs stored in the temporary storage unit 105. It is determined whether a transmission delay time is set in the oldest communication log in the storage unit 105 (step B15). When it is determined that the transmission delay time is set (Yes in step B15), the transmission delay time setting unit 106 sets the transmission delay time for the communication log stored last in the temporary storage unit 105 ( Step B16). When it is determined that the transmission delay time is not set (No in Step B15), the transmission delay time setting unit 106 sets the transmission delay time for all communication logs in the temporary storage unit 105 (Step B17). .
ステップB14において一時記憶部105内に格納されている通信ログの数が設定数より多くない場合(ステップB14のNo)、送信遅延時間設定部106は、一時記憶部105内に格納されている全ての通信ログの送信遅延時間を0に設定する(ステップB18)。
When the number of communication logs stored in the temporary storage unit 105 in step B14 is not larger than the set number (No in step B14), the transmission delay time setting unit 106 stores all of the communication logs stored in the temporary storage unit 105. Is set to 0 (step B18).
図5は、通信ログを送信する手順を示すフローチャートである。図5のフローチャートを参照して、通信ログを送信する手順を説明する。
通信ログ送信処理部108は、一時記憶部105内の一番古い通信ログに設定されている送信遅延時間を取得する(ステップB21)。通信ログ送信処理部108は、通信ログ送信時間記憶部109から最後に送信された通信ログの送信時刻を示す送信時間情報を取得する(ステップB22)。通信ログ送信処理部108は、現在時刻が最後に送信された通信ログの送信時刻に送信待機時間を足した時刻である送信予定時刻を過ぎているかを判定する(ステップB23)。現在時刻が送信予定時刻を過ぎていないと判定した場合(ステップB23のNo)、送信遅延時間設定部106は、所定時間後に再度ステップB23を実行する。所定時間は、たとえば送信予定時刻から現在時刻を引いた時間である。 FIG. 5 is a flowchart showing a procedure for transmitting a communication log. A procedure for transmitting a communication log will be described with reference to the flowchart of FIG.
The communication logtransmission processing unit 108 acquires the transmission delay time set in the oldest communication log in the temporary storage unit 105 (step B21). The communication log transmission processing unit 108 acquires transmission time information indicating the transmission time of the communication log last transmitted from the communication log transmission time storage unit 109 (step B22). The communication log transmission processing unit 108 determines whether the scheduled transmission time, which is the time obtained by adding the transmission standby time to the transmission time of the communication log transmitted last, is over (step B23). When it is determined that the current time has not passed the scheduled transmission time (No in Step B23), the transmission delay time setting unit 106 executes Step B23 again after a predetermined time. The predetermined time is, for example, a time obtained by subtracting the current time from the scheduled transmission time.
通信ログ送信処理部108は、一時記憶部105内の一番古い通信ログに設定されている送信遅延時間を取得する(ステップB21)。通信ログ送信処理部108は、通信ログ送信時間記憶部109から最後に送信された通信ログの送信時刻を示す送信時間情報を取得する(ステップB22)。通信ログ送信処理部108は、現在時刻が最後に送信された通信ログの送信時刻に送信待機時間を足した時刻である送信予定時刻を過ぎているかを判定する(ステップB23)。現在時刻が送信予定時刻を過ぎていないと判定した場合(ステップB23のNo)、送信遅延時間設定部106は、所定時間後に再度ステップB23を実行する。所定時間は、たとえば送信予定時刻から現在時刻を引いた時間である。 FIG. 5 is a flowchart showing a procedure for transmitting a communication log. A procedure for transmitting a communication log will be described with reference to the flowchart of FIG.
The communication log
現在時刻が送信予定時刻を過ぎていると判定した場合(ステップB23のYes)、通信ログ送信処理部108は、第2の送受信部103を用いて、一時記憶部105内の一番古い通信ログをセキュリティ監視センタ30に送信するための処理を行う(ステップB24)。通信ログ送信処理部108は、通信ログ送信時間記憶部109に送信時間を記録する(ステップB25)。通信ログ送信処理部108は、一時記憶部105内の一番古い通信ログを削除する(ステップB26)。
When it is determined that the current time has passed the scheduled transmission time (Yes in step B23), the communication log transmission processing unit 108 uses the second transmission / reception unit 103 to store the oldest communication log in the temporary storage unit 105. Is transmitted to the security monitoring center 30 (step B24). The communication log transmission processing unit 108 records the transmission time in the communication log transmission time storage unit 109 (step B25). The communication log transmission processing unit 108 deletes the oldest communication log in the temporary storage unit 105 (step B26).
一時記憶部105内に格納されている通信ログの数が設定数より多い場合に、通信ログを直ぐに送信するのではなく、通信ログを遅延させて送信することで、制御システムにおける多重状変のような多数の状変イベントが生成されるときでも通信ログで通信回線がひっ迫することなく、通信ログを通信できるようになる。
When the number of communication logs stored in the temporary storage unit 105 is larger than the set number, the communication log is not transmitted immediately, but is transmitted by delaying the communication log. Even when such a large number of status change events are generated, the communication log can be communicated without the communication line becoming tight with the communication log.
(時刻補正)
通信ログの送信を遅延させることによりセキュリティ監視センタ30での受信時刻とイベント発生時刻の間にずれが生じる。通信ログにタイムスタンプを入れることでこの問題は回避できるが、各装置の時刻同期が正確であることが必要になる。そこで、遅延を入れた場合、通信ログに遅延時間に基づいた遅延時間情報を付加しておくことで、セキュリティ監視センターで時刻補正できるように構成することもできる。遅延時間情報は、送信予定時刻と通信ログの生成時間との差を示す時間である。 (Time correction)
Delaying the transmission of the communication log causes a difference between the reception time at thesecurity monitoring center 30 and the event occurrence time. Although this problem can be avoided by putting a time stamp in the communication log, the time synchronization of each device needs to be accurate. Therefore, when a delay is added, it is possible to add a delay time information based on the delay time to the communication log so that the security monitoring center can correct the time. The delay time information is a time indicating a difference between the scheduled transmission time and the communication log generation time.
通信ログの送信を遅延させることによりセキュリティ監視センタ30での受信時刻とイベント発生時刻の間にずれが生じる。通信ログにタイムスタンプを入れることでこの問題は回避できるが、各装置の時刻同期が正確であることが必要になる。そこで、遅延を入れた場合、通信ログに遅延時間に基づいた遅延時間情報を付加しておくことで、セキュリティ監視センターで時刻補正できるように構成することもできる。遅延時間情報は、送信予定時刻と通信ログの生成時間との差を示す時間である。 (Time correction)
Delaying the transmission of the communication log causes a difference between the reception time at the
図6は、セキュリティ監視センタ30の構成の一例を示すブロック図である。
セキュリティ監視センタ30は、ログ受信部201、ログ記録部202、時刻補正部203、ログ分析部204、および結果提示部205等を備えている。 FIG. 6 is a block diagram illustrating an example of the configuration of thesecurity monitoring center 30.
Thesecurity monitoring center 30 includes a log receiving unit 201, a log recording unit 202, a time correction unit 203, a log analysis unit 204, a result presentation unit 205, and the like.
セキュリティ監視センタ30は、ログ受信部201、ログ記録部202、時刻補正部203、ログ分析部204、および結果提示部205等を備えている。 FIG. 6 is a block diagram illustrating an example of the configuration of the
The
ログ受信部201は、ネットワークAを介して通信ログを受信する。受信された通信ログはログ記録部202に格納される。受信された通信ログは時刻補正部203に通知される。時刻補正部203は、通信ログ内の遅延時間情報に基づいて、通信ログの送信時間(または、受信時刻)を補正する。ログ分析部204は、補正された時刻を用いて、通信ログを分析する。ログ分析部204は、分析により、セキュリティ攻撃やその予兆となる侵入を検知する。具体的には、アノーマリー分析と呼ばれる分析がある。例えば相関分析などにより、通常の通信パターンとの違う通信パターンを見つけることで攻撃を判定する方法がある。これにより、例えば、攻撃に先立って通常行われる攻撃対象を見つけるためのポートスキャンでは、普段使わないポートへの大量のアクセスなどを発生させるため発見することが可能になる。セキュリティ攻撃やその予兆となる侵入を検知された場合、結果提示部205は、その旨を提示する処理を行う。
The log receiving unit 201 receives a communication log via the network A. The received communication log is stored in the log recording unit 202. The received communication log is notified to the time correction unit 203. The time correction unit 203 corrects the transmission time (or reception time) of the communication log based on the delay time information in the communication log. The log analysis unit 204 analyzes the communication log using the corrected time. The log analysis unit 204 detects a security attack or an intrusion that is a sign of the security attack by analysis. Specifically, there is an analysis called anomaly analysis. For example, there is a method of determining an attack by finding a communication pattern different from a normal communication pattern by correlation analysis or the like. As a result, for example, in a port scan for finding an attack target that is normally performed prior to an attack, it is possible to discover a large number of accesses to ports that are not normally used. When a security attack or an intrusion that is a sign of the security attack is detected, the result presentation unit 205 performs a process of presenting the fact.
(変形例)
図7に示すように、通信ログを送信するためのログ送信部301を設け、通信ログ送信処理部108が、ログ送信部301を用いて通信ログをセキュリティ監視センタ30に送信するための処理を行っても良い。 (Modification)
As shown in FIG. 7, alog transmission unit 301 for transmitting a communication log is provided, and the communication log transmission processing unit 108 performs processing for transmitting a communication log to the security monitoring center 30 using the log transmission unit 301. You can go.
図7に示すように、通信ログを送信するためのログ送信部301を設け、通信ログ送信処理部108が、ログ送信部301を用いて通信ログをセキュリティ監視センタ30に送信するための処理を行っても良い。 (Modification)
As shown in FIG. 7, a
なお、上記実施形態では、最後に送信された通信ログの送信時刻に送信待機時間を足した時刻である送信予定時刻していたが、通信ログが生成された時刻に送信待機時間を足した時刻を送信予定時刻しても良い。この場合、遅延時間情報は、送信予定時刻と通信ログの生成時間との差を示す時間である。
In the above embodiment, the scheduled transmission time, which is the time when the transmission waiting time is added to the transmission time of the communication log transmitted last, is the time when the transmission waiting time is added to the time when the communication log is generated. May be the scheduled transmission time. In this case, the delay time information is a time indicating a difference between the scheduled transmission time and the communication log generation time.
本実施形態によれば、一時記憶部105内に格納されている通信ログの数が設定数より多い場合に、通信ログを直ぐに送信するのではなく、通信ログを遅延させて送信することで、制御システムにおける多重状変のような多数の状変イベントが生成されるときでも通信ログで通信回線がひっ迫することなく、通信パケットの伝送遅延や正規のパケットや通信ログが失われることを防止することが可能になる。
According to the present embodiment, when the number of communication logs stored in the temporary storage unit 105 is larger than the set number, the communication log is not transmitted immediately, but is transmitted with a delay, Even when a large number of status change events such as multiple status changes in the control system are generated, the communication line is not constrained by the communication log, preventing transmission packet transmission delays and loss of regular packets and communication logs. It becomes possible.
なお、本実施形態の通信ログ生成部104、送信遅延時間設定部106、乱数生成部107、通信ログ送信処理部108によって行われる手順は全てソフトウェアによって実行することができる。このため、制御処理の手順を実行するプログラムを格納したコンピュータ読み取り可能な記憶媒体を通じてこのプログラムを通常のコンピュータにインストールして実行するだけで、本実施形態と同様の効果を容易に実現することができる。
Note that all procedures performed by the communication log generation unit 104, the transmission delay time setting unit 106, the random number generation unit 107, and the communication log transmission processing unit 108 of the present embodiment can be executed by software. For this reason, it is possible to easily realize the same effect as that of the present embodiment simply by installing and executing this program on a normal computer through a computer-readable storage medium storing a program for executing the control processing procedure. it can.
本発明のいくつかの実施形態を説明したが、これらの実施形態は、例として提示したものであり、発明の範囲を限定することは意図していない。これら新規な実施形態は、その他の様々な形態で実施されることが可能であり、発明の要旨を逸脱しない範囲で、種々の省略、置き換え、変更を行うことができる。これら実施形態やその変形は、発明の範囲や要旨に含まれるとともに、特許請求の範囲に記載された発明とその均等の範囲に含まれる。
Although several embodiments of the present invention have been described, these embodiments are presented as examples and are not intended to limit the scope of the invention. These novel embodiments can be implemented in various other forms, and various omissions, replacements, and changes can be made without departing from the scope of the invention. These embodiments and modifications thereof are included in the scope and gist of the invention, and are included in the invention described in the claims and the equivalents thereof.
Claims (6)
- 第1の通信装置宛てに送信されたパケットおよび前記第1の通信装置から送信されたパケットのログを生成する生成手段と、
前記生成手段によって生成されたログを格納する第1の記憶部と、
前記記憶部に格納されているログの数に応じて、前記第1の記憶部に格納されている各ログに対して送信待機時間を設定する設定手段と、
各ログの送信待機時間に応じて、各ログを分析装置に送信するための処理を行う送信処理手段と、
を具備する電子機器。 Generating means for generating a log of a packet transmitted to the first communication device and a packet transmitted from the first communication device;
A first storage unit for storing a log generated by the generating unit;
Setting means for setting a transmission standby time for each log stored in the first storage unit according to the number of logs stored in the storage unit;
According to the transmission waiting time of each log, transmission processing means for performing processing for transmitting each log to the analyzer,
An electronic device comprising: - 乱数を生成する乱数生成部を更に具備し、
前記設定手段は、前記乱数生成部によって生成された乱数に基づいて送信待機時間を設定する
請求項1に記載の電子機器。 A random number generator for generating random numbers;
The electronic device according to claim 1, wherein the setting unit sets a transmission standby time based on a random number generated by the random number generation unit. - 最後に送信されたログの送信時間を示す送信時間情報が格納される第2の記憶部を更に具備し、
前記送信処理手段は、前記送信時間情報が示す送信時間と第1のログに設定された送信待機時間とに基づいて、前記第1のログを前記分析装置に送信するための処理を行う
請求項1に記載の電子機器。 A second storage unit that stores transmission time information indicating the transmission time of the last transmitted log;
The transmission processing means performs processing for transmitting the first log to the analyzer based on a transmission time indicated by the transmission time information and a transmission standby time set in the first log. 1. The electronic device according to 1. - 前記ログは、送信待機時間に基づいた待機時間情報を含む
請求項1に記載の電子機器。 The electronic device according to claim 1, wherein the log includes standby time information based on a transmission standby time. - 第1の通信装置宛てに送信されたパケットおよび前記第1の通信装置から送信されたパケットのログを生成し、
前記ログを記憶部に格納し、
前記記憶部に格納されているログの数に応じて、前記記憶部に格納されているログに対して送信待機時間を設定し、
各ログの送信待機時間に応じて、各ログを分析装置に送信するための処理を行う
ログ送信方法。 Generating a log of packets transmitted to the first communication device and packets transmitted from the first communication device;
Storing the log in a storage unit;
According to the number of logs stored in the storage unit, set a transmission waiting time for the log stored in the storage unit,
A log transmission method for performing processing for transmitting each log to the analyzer according to the transmission waiting time of each log. - 第1の通信装置宛てに送信されたパケットおよび前記第1の通信装置から送信されたパケットのログを生成する手順と、
前記ログを記憶部に格納する手順と、
前記記憶部に格納されているログの数に応じて、前記記憶部に格納されているログに対して送信待機時間を設定する手順と、
各ログの送信待機時間に応じて、各ログを分析装置に送信するための処理を行う
をコンピュータに実行させるためのプログラム。 Generating a log of packets transmitted to the first communication device and packets transmitted from the first communication device;
A procedure for storing the log in a storage unit;
According to the number of logs stored in the storage unit, a procedure for setting a transmission waiting time for the log stored in the storage unit,
A program for causing a computer to execute processing for transmitting each log to the analyzer according to the transmission waiting time of each log.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2013/067880 WO2014207919A1 (en) | 2013-06-28 | 2013-06-28 | Electronic device |
JP2015523798A JP5976934B2 (en) | 2013-06-28 | 2013-06-28 | Electronics |
US14/978,058 US10313374B2 (en) | 2013-06-28 | 2015-12-22 | Electronic apparatus and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2013/067880 WO2014207919A1 (en) | 2013-06-28 | 2013-06-28 | Electronic device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/978,058 Continuation US10313374B2 (en) | 2013-06-28 | 2015-12-22 | Electronic apparatus and method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014207919A1 true WO2014207919A1 (en) | 2014-12-31 |
Family
ID=52141310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/067880 WO2014207919A1 (en) | 2013-06-28 | 2013-06-28 | Electronic device |
Country Status (3)
Country | Link |
---|---|
US (1) | US10313374B2 (en) |
JP (1) | JP5976934B2 (en) |
WO (1) | WO2014207919A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2021064773A1 (en) * | 2019-09-30 | 2021-04-08 | ||
JP2023037755A (en) * | 2021-09-06 | 2023-03-16 | 富士通株式会社 | Data transmission program, information processing apparatus, and data transmission method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10097439B1 (en) * | 2016-11-30 | 2018-10-09 | Sprint Communications Company L.P. | Mobile communication device self-testing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07163067A (en) * | 1993-12-06 | 1995-06-23 | Toshiba Corp | Distributed type electric power system monitor control equipment |
JP2008071085A (en) * | 2006-09-13 | 2008-03-27 | Ricoh Co Ltd | Image processor and log transfer method |
JP2010252029A (en) * | 2009-04-15 | 2010-11-04 | Nec Corp | System and method for state management, management device, management object device, and program |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2834210B2 (en) * | 1988-09-14 | 1998-12-09 | 株式会社日立製作所 | Message control method in ring network |
GB2261799B (en) * | 1991-11-23 | 1995-04-19 | Dowty Communications Ltd | Packet transmission system |
DE10062303C2 (en) * | 2000-12-14 | 2002-11-28 | Layers Ag 7 | Method for operating an ad hoc network for wireless data transmission of synchronous and asynchronous messages |
JP3769468B2 (en) * | 2001-03-21 | 2006-04-26 | 株式会社エヌ・ティ・ティ・ドコモ | Communication quality control method, communication quality control system, packet analysis device, and data transmission terminal device |
EP1705845B1 (en) * | 2004-01-09 | 2012-08-08 | NEC Corporation | Load distributing method |
US20090003329A1 (en) * | 2004-02-09 | 2009-01-01 | Koso Murakami | Repeater, Communication System, Control Circuit, Connector, and Computer Program |
JP4308045B2 (en) | 2004-03-04 | 2009-08-05 | 日本放送協会 | Content providing system, content providing server, user terminal, content providing program, and content acquisition program |
US7400578B2 (en) * | 2004-12-16 | 2008-07-15 | International Business Machines Corporation | Method and system for throttling network transmissions using per-receiver bandwidth control at the application layer of the transmitting server |
JP4580770B2 (en) * | 2005-02-01 | 2010-11-17 | 株式会社エヌ・ティ・ティ・ドコモ | Communication system and receiving apparatus |
JP4405419B2 (en) * | 2005-03-31 | 2010-01-27 | 株式会社東芝 | Screen transmitter |
JP4640824B2 (en) * | 2006-01-30 | 2011-03-02 | 富士通株式会社 | Communication environment measuring method, receiving apparatus, and computer program |
US8214847B2 (en) * | 2007-11-16 | 2012-07-03 | Microsoft Corporation | Distributed messaging system with configurable assurances |
US8345570B2 (en) * | 2009-12-10 | 2013-01-01 | Alcatel Lucent | Network impairment metrics for timing over packet |
JP2012181744A (en) | 2011-03-02 | 2012-09-20 | Kddi Corp | Operation monitoring system and operation monitoring method for distributed file system |
-
2013
- 2013-06-28 JP JP2015523798A patent/JP5976934B2/en active Active
- 2013-06-28 WO PCT/JP2013/067880 patent/WO2014207919A1/en active Application Filing
-
2015
- 2015-12-22 US US14/978,058 patent/US10313374B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07163067A (en) * | 1993-12-06 | 1995-06-23 | Toshiba Corp | Distributed type electric power system monitor control equipment |
JP2008071085A (en) * | 2006-09-13 | 2008-03-27 | Ricoh Co Ltd | Image processor and log transfer method |
JP2010252029A (en) * | 2009-04-15 | 2010-11-04 | Nec Corp | System and method for state management, management device, management object device, and program |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2021064773A1 (en) * | 2019-09-30 | 2021-04-08 | ||
WO2021064773A1 (en) * | 2019-09-30 | 2021-04-08 | 日本電気株式会社 | Management device, network monitoring system, assessment method, communication method, and non-transitory computer-readable medium |
JP7290168B2 (en) | 2019-09-30 | 2023-06-13 | 日本電気株式会社 | Management device, network monitoring system, determination method, communication method, and program |
JP2023037755A (en) * | 2021-09-06 | 2023-03-16 | 富士通株式会社 | Data transmission program, information processing apparatus, and data transmission method |
JP7652021B2 (en) | 2021-09-06 | 2025-03-27 | エフサステクノロジーズ株式会社 | Data transmission program, information processing device and data transmission method |
Also Published As
Publication number | Publication date |
---|---|
US20160112449A1 (en) | 2016-04-21 |
JP5976934B2 (en) | 2016-08-24 |
US10313374B2 (en) | 2019-06-04 |
JPWO2014207919A1 (en) | 2017-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11374835B2 (en) | Apparatus and process for detecting network security attacks on IoT devices | |
US8717871B2 (en) | Packet retransmission control system, method and program | |
US10652211B2 (en) | Control device, border router, control method, and control program | |
JP5867188B2 (en) | Information processing apparatus, congestion control method, and congestion control program | |
US9596164B1 (en) | Application visibility in layer 3 networks | |
JP5976934B2 (en) | Electronics | |
JP2014138262A (en) | Monitoring system and monitoring program | |
US20170141989A1 (en) | In-line tool performance monitoring and adaptive packet routing | |
US9559932B2 (en) | Route determination apparatus and transfer route determination method | |
US20170048124A1 (en) | Communication system, receiving-side apparatus and transmission-side apparatus | |
US10320616B2 (en) | Method and a system for sideband server management | |
US11477098B2 (en) | Identification of candidate problem network entities | |
US12276948B2 (en) | Method and system for providing time-critical control applications | |
CN112866338A (en) | Server state detection method and device | |
JP2010205234A (en) | Monitoring system, network apparatus, monitoring information providing method, and program | |
WO2016080112A1 (en) | Control device | |
JP6973405B2 (en) | Measurement control server, communication quality measurement system, measurement agent, method and program | |
JP2019125914A (en) | Communication device and program | |
JP6513001B2 (en) | Failure detection device, failure detection method, and program | |
US9819691B2 (en) | Network monitoring system and method | |
US9455911B1 (en) | In-band centralized control with connection-oriented control protocols | |
WO2016184079A1 (en) | Method and device for processing system log message | |
KR101627796B1 (en) | Device Indicator Data Transmitting Method for Network based AV System | |
JP6369255B2 (en) | Information processing system, information processing apparatus, information processing method, and program | |
CN106233761A (en) | The system and method that cloud among overall and multiple location databases synchronizes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13888389 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2015523798 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13888389 Country of ref document: EP Kind code of ref document: A1 |